About The Position

GCI is looking for a highly motivated and experienced Senior Intelligence Operations Support to join our team. The ideal candidate is responsible for the below. 1. The candidate should be able to comprehend, and subtleties involved in deconflicting and identifying potential Computer Network Exploitation targets for projects. 2. The candidate is expected to support both the active gathering of information through Cyber Operations and the examination of the data collected during these projects. 3. The candidate is expected to provide direct support for exploiting vulnerabilities in complex computer networks. 4. The candidate is expected to develop and understanding of the procedure and protocols governing the approval of Computer Network Exploitation, as well as other relevant documentation and authorizations. Additionally, the resource will contribute to the development and refinement of these documents and processes. 5. The candidate will utilize all available targeting information and tools to support the identification, access, and exploitation of vulnerabilities in networks and devices as part of Computer Network Exploitation operations. 6. The candidate shall use targeting tools to review collection and identify opportunities for cyber projects. 7. The candidate is expected to use a range of data sources, including publicly available information and other relevant data, to support the expansion of access within target networks throughout the duration of the project. 8. The candidate is expected to use a range of data sources to identify information that can facilitate access to an expansion within target networks. The primary focus will be on using available information and taskings to identify key insights that can support network exploitations. 9. The candidate will collaborate with teams and organizations to create detailed technical packages that support network exploitation. 10. The candidate will employ a range of techniques and tools to analyze data from diverse sources, including various operating systems, applications, and network devices. This will involve using skills in programming, data analysis, and other relevant areas to examine and interpret the collected data.

Requirements

  • Demonstrated experience working with customer databases and analytic tools.
  • Demonstrated experience using knowledge of telecommunications, including cellular networks and computer networks.
  • Demonstrated experience developing, coordinating, and guiding technical and cyber projects.
  • Demonstrated experience with a proven track record of analyzing network data, including information related to network traffic, security controls, system configurations, and user authentication.
  • Demonstrated experience supporting cyber projects for government agencies.
  • Demonstrated experience supporting cyber-related activities aimed at analyzing and gathering information, as well as expanding technical capabilities to collect and process data.
  • Demonstrated experience utilizing various technical tools and databases to support operations, including those related to gathering and analyzing information.
  • Demonstrated experience with cable writing to include proposals.
  • Demonstrated experience developing and implementing strategies for gathering and analyzing information in complex environments, leveraging advance technical capabilities and methodologies to support mission objectives.
  • Demonstrated experience working with mobile technologies, including those related to wireless communication systems.
  • 8-10 years of experience
  • BA/BS (or equivalent experience)

Nice To Haves

  • Demonstrated experience supporting sensitive or discreet projects that require careful planning and execution.
  • Demonstrated experience using various technical tools and software applications to analyze and examine computer networks and systems.

Responsibilities

  • The candidate should be able to comprehend, and subtleties involved in deconflicting and identifying potential Computer Network Exploitation targets for projects.
  • The candidate is expected to support both the active gathering of information through Cyber Operations and the examination of the data collected during these projects.
  • The candidate is expected to provide direct support for exploiting vulnerabilities in complex computer networks.
  • The candidate is expected to develop and understanding of the procedure and protocols governing the approval of Computer Network Exploitation, as well as other relevant documentation and authorizations. Additionally, the resource will contribute to the development and refinement of these documents and processes.
  • The candidate will utilize all available targeting information and tools to support the identification, access, and exploitation of vulnerabilities in networks and devices as part of Computer Network Exploitation operations.
  • The candidate shall use targeting tools to review collection and identify opportunities for cyber projects.
  • The candidate is expected to use a range of data sources, including publicly available information and other relevant data, to support the expansion of access within target networks throughout the duration of the project.
  • The candidate is expected to use a range of data sources to identify information that can facilitate access to an expansion within target networks. The primary focus will be on using available information and taskings to identify key insights that can support network exploitations.
  • The candidate will collaborate with teams and organizations to create detailed technical packages that support network exploitation.
  • The candidate will employ a range of techniques and tools to analyze data from diverse sources, including various operating systems, applications, and network devices. This will involve using skills in programming, data analysis, and other relevant areas to examine and interpret the collected data.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service